Académique Documents
Professionnel Documents
Culture Documents
Network list
Work Area
Introduction to Netconfigtoolj
File Menu
Start a new network configuration. This will delete
the current network configuration loaded on the
NetCfgTool.
Select an NE
PNMS Tab
Network Properties
Right click in the background and select Network properties
The NEC PNMS is a sophisticated supervisory tool for transmission equipment and allows operator to
perform remote system monitor alarms, control NE configuration parameters and display event logging and
performance data in either UNIX or Microsoft Windows platform.
Fig. above shows a typical PNMS application. The system consists of a central computer (PNMS PC) and a
number of remote data processing nodes called as PM cards. It supervises and controls the Pasolink
transmission equipments.
System Components
PNMS : The central site computer is the central operator interface and database from which system
operators manage the Pasolink network. It receives the data via PM card, stores it and displays it to the
operator in a variety of formats. It accepts command request from the operators and sends them to the on-
site equipment for execution. Two types of PNMS can be proposed in accordance with customer‟s
network size viz : PNMS on Windows NT/2000/XP and the other is PNMS on UNIX OS.
Pasolink Management (PM) Card : PM cards are located at each site in the monitored network to
collect alarm and status information from Pasolink and to control that equipment in response to
commands from the central site operator. The PMC primary tasks are to control and acquire data from
Pasolink at remote location and transfer this data back to the central site. The PM card is designed as
plug-in modules.
PM card is functioned as SNMP agent, which detects alarm and status changes in monitored equipment
and sends change of notifications to PNMS.
PM card retains the MIB data and transmits a response to “SNMP GET” commands from PNMS and
PNMT.
PMC Operation Modes
Depending on the size, a network can normally be divided into a number of sub-networks. To
distribute the traffic load we normally define one of the PMC as master and the rest as slaves
through discrete design. We also call a master as Central PMC (CPM), a sub-master as Sub-
Central PMC (SCPM) and a slave as Remote PMC (RPM).
Even though there is no difference in the hardware design, the PMC will be playing different roles
according to the installed software in a NMS as follows :
Master mode (CPM) :
• To get information from the remote sites and to generate reports to the PNMS. The
CPM may act as a terminal unit; which processes and then transfers all the physical
information of equipment, which is directly connected to the CPM.
• The CPM is connected to PNMS via a dedicated serial communications link, and passes
messages received from RPMCs to the PNMS for display.
Sub Master mode (SCPM) :
• Master and gateway function which performs the same activity as a CPM acting as a
gateway between CPM and RPM and routing the messages from CPM to RPM and
back.
• It also performs a terminal unit function that acts as a stand-alone data acquisition and
control unit which processes and then transfers all the physical information of
equipment which is directly connected to the SCPM. This function is same as that of
RPM.
Slave mode (RPM) :
• It is a stand-alone data acquisition and control unit. It monitors and controls
equipments at some remote location. The prime task of RPM is to monitor, control and
transfer data back to the central site.
PMC Operation Modes
NEO NE
IP Address
For the TCP/IP communication, each node connected in the network needs to be given an
IP address. By interpreting the given IP address, all the nodes can communicate each
other.
The form of the IP address is :
- Length : 32 bits
- It consists of two parts
Network Part (Also called Network Address)
Field to identify the logical network
Host Part (also called Host Address)
-Notation
Dividing 32 bits into four 8-bits sections, changing each of them into decimal numbers,
and arraying them in a line with dots separating those numbers (called “dot notation”)
Example : 1100 0011 0000 0000 0001 0010 0011 0100
195 . 0 . 12 . 34
27
IP Address
Classifying IP address (Class A B and C)
IP address are classified according to the values of their most significant 1 to 4 bits.
There are five classes; A, B, C, D and E. The classes D and E are however, used for
special purposes only and are not dealt with. Class A, B and C are explained here. These
three classes are allocated to nodes and devices according to the number of networks and
host computers in a network.
Class A (from 0.x.x.x to 127.x.x.x)
Number of networks : 128 (= 2^7)
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 3 1
Number of Host per Network :
16,777,214 (=2^24-2)
0 7 bits 24 bits
All “0” is used to indicate the network
Network Part Host Part itself and all „1” is used for IP
broadcast address.
28
IP Address
Global IP address and Private IP address
The Global Address refers to the IP address uniquely assigned to a device connected to
the Internet and is essential for communicating through the Internet. The Global Address
is centrally administered by IANA, under whose jurisdiction the NICs (Network
Information Centers) of each country allocates addresses to such organizations as service
providers.
The Private Address can be freely allocated within an organization without applying for
the allocation to NIC. The address space which never be accessed in the Internet is
defined by RFC (Request For Comment) -1918.
INTERNET INTERNET
* NAT : Network
Address Translation
With Subnet
30
Subnet Mask IP Address
The Subnet Mask is used to identify the boundary of the network part and the host part in the network that
divided in to subnets.
The notation of the subnet mask is similar to the IP address. The 32-bit array is divided in to four 8-bit parts,
each of which then converted into decimal numbers. These numbers are arrayed in a line with dots placed
between them for separation. The part where the bit stream shows continuous “1”s in the subnet mask means the
network part. The subnet mask utilized for a node to check if other corresponding computers belong to the same
subnet (segment).
Example : The subnet mask of an IP address whose network part consists of first 26 bits.
11111111 11111111 11111111 11000000
( 255 . 255 . 255 . 192 )
Calculation of Network Address from an IP Address and Subnet Mask : Comparison of IP address and
subnet mask of the node leads to the network address. The comparison is to be done in the following steps.
IP address (Decimal) : 195 . 125 . 100 . 8
: 255 . 255 . 255 . 192
IP address (Binary) : 11000011 01000101 01100100 00001000 Apply logical AND
Subnet mask (Binary) : 11111111 11111111 11111111 11000000 CIDR (classless inter-
domain routing :
Network Address(24bits) Host (6bits)
Subnet address(2bits) 195. 125. 100. 8/26*
* Indicates first 26 bits is
Network address (Binary) : 11000011 01111101 01100100 00000000
network address
(including subnet)
RS232C
19.2/9.6kbps, Async
PNMS Remote Site-B
4 5
PNMS
(Windows) 2 3
Remote Site-C
Remote Site-A
6 7
Remote Site-D
1 : CPM
2 : RPM
8
172.20.101.1 172.20.101.4
172.20.101.3 172.20.101.5 172.20.101.7
RS232C
19.2/9.6kbps, Async
R IP R 1
Network Remote Site-B
PNMS
4 5
2 3
Remote Site-C
Remote Site-A
6 7
172.20.101.1 172.20.101.4
172.20.101.3 172.20.101.5 172.20.101.7
172.20.101.2 172.20.101.6
1
CPM
Central Site 2 3 4 5 6 7 8
RPM RPM RPM RPM RPM RPM RPM
RS232C
19.2/9.6kbps, Async
Remote Site-B
1
PNMS 5 6
(Windows)
Central Site
3 4
Remote Site-E Remote Site-C
Remote Site-A 7
Remote Site-G 10 9 2
8
13 12 11
RS485
Remote Site-D
9.6kbps, Async
Remote Site-F
1 : CPM
14
2 : SCPM
3 : RPM
Subnet-C
Figure 7.7 Typical Network Example (Multi sub-branches network[Logical Model])
Network Size ( Pasolink Family)
Network Sizing Rule :
255.255.255.252 4 2 1
255.255.255.248 8 6 5
255.255.255.240 16 14 13
255.255.255.224 32 30 29
255.255.255.192 64 62 61
39
PNMSj Basic Operation
Main Window Map: Group Map
Main Menu
Views
Event Log
Map Views
Security Window
Link Summary Window
Group Properties Window (Adding new user)
PNMS Properties Window
Active Alarm Window
Alarm History Window
Event Log History Window
Network Configuration Update Window
Network Configuration
Update Wizard (1/6)
Network Configuration Update Window
This function is used to download configuration files created by the NetConfig Tool to the PM Card in the selected NE.
There are two files created for each NE – MIB.cfg and Network.cfg.
MIB.cfg contains file contains relevant information about the equipment (i.e. name, pm type, etc.) and housekeeping (Aux. I/O).
Network.cfg contains the IP address of the target NE as well as the IP address of the opposite NE and the information about the network where the target
NE is located.
Click on the CONFIGURATION FILE button under the DOWNLOAD (PC>>PMC) in the PMC window to open the Download Configuration file
window.
Configuration files Downloading
Select each type of config file one by one from the type window
Browse and select the path location to the file selected in the type window
A message window indicates the status of the download operation and it will close automatically once the operation is over.
Configuration files Downloading
Configuration files Downloading
After the successful download of the configuration files, click UPDATE button. Update Configuration File window opens.
Select the appropriate box for the type of configuration file(s) that will be updated.
While updating CFG file, PMC to PMC communication will be lost when PMC initializes to the new system configuration. During this time,
PNMT connection to the Pasolink will be lost but will be automatically be reconnected after the PMC resets.
Thank You
64